Suped

Summary

DMARC failures for forwarded emails are a persistent challenge, especially when recipients' internal systems, like Microsoft 365 or cloud security appliances, modify email headers or IP addresses during the forwarding process. This often breaks SPF and DKIM authentication, leading to DMARC alignment failures. While the original sender's email may be properly authenticated, the forwarded version often isn't, causing deliverability issues for crucial alerts or internal communications. Addressing this requires understanding the technical nuances of email forwarding and exploring indirect solutions, given that direct control over recipient systems is usually impossible.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

What email marketers say

Email marketers often face the difficult reality of DMARC failures stemming from recipient-side forwarding, especially with automated system alerts that are critical but not directly revenue-generating. The consensus among marketers is that while the problem is widespread, particularly with Microsoft 365, direct intervention is often impossible. This forces a focus on mitigation strategies, such as recipient education, exploring alternative communication channels, or adjusting DMARC policies to avoid blocking essential messages.

Marketer view

Marketer from Email Geeks states that Microsoft 365 accounts are a common source of DMARC failures, often due to improper forwarding configurations. They suggest that if mail flow cannot be changed, a targeted outreach to recipients, asking them to allow-list the sender, is likely the best course of action. They also propose considering a secondary channel, such as PagerDuty or Signal, as an alert endpoint to mitigate the problem.

02 Apr 2024 - Email Geeks

Marketer view

Marketer from Email Geeks points out that it's challenging to identify which specific recipients are causing DMARC failures or even determine if the mail is being rejected, as their DMARC reporting service doesn't provide disposition data. They indicate that manually sifting through DMARC reports to pinpoint failures is difficult without advanced SQL query skills.

02 Apr 2024 - Email Geeks

What the experts say

Email experts understand that DMARC failures for forwarded mail are an inherent challenge due to how email authentication protocols interact with mail transfer agents (MTAs) that modify messages. While direct control over recipient forwarding is rare, experts focus on sender-side best practices, such as robust DKIM signing and the strategic use of DMARC policies. They also emphasize the emerging role of ARC (Authenticated Received Chain) as a potential long-term solution, although its widespread adoption by forwarding services is still evolving.

Expert view

Expert from SpamResource explains that SPF fails when emails are forwarded because the SPF check is performed against the IP address of the last hop, which becomes the forwarding server's IP rather than the original sender's. This often leads to authentication failure if the forwarding server's IP is not authorized in the sender's SPF record.

02 Apr 2024 - SpamResource

Expert view

Expert from Word to the Wise suggests that while DKIM is generally more resilient to forwarding than SPF, changes to the email's body or headers during forwarding can still break the DKIM signature. They advise senders to ensure their DKIM implementation is robust to withstand minor modifications.

02 Apr 2024 - Word to the Wise

What the documentation says

Official documentation and technical guides consistently highlight that email forwarding, by its very nature, can interfere with DMARC authentication mechanisms like SPF and DKIM. While DMARC is critical for security, its strict alignment requirements are often at odds with how email forwarding services operate. The Authenticated Received Chain (ARC) is introduced as the standard protocol to mitigate this, providing a chain of custody for email authentication results across multiple hops. Understanding these technical underpinnings is vital for troubleshooting and managing DMARC policies effectively.

Technical article

Documentation from DuoCircle outlines that a common reason for DMARC failures is domain alignment issues, where DMARC verifies if the domain in the From header aligns with the SPF and DKIM authentication results. Forwarding often disrupts this alignment, leading to authentication failures.

02 Apr 2024 - DuoCircle

Technical article

Documentation from GoDMARC Knowledge Base explains that email forwarding affects DMARC authentication by potentially altering email content or headers, which can break SPF and DKIM. They discuss potential challenges this creates and offer best practices to mitigate issues while maintaining security protocols.

02 Apr 2024 - GoDMARC Knowledge Base

15 resources

Start improving your email deliverability today

Get started